On Thu, Apr 05, 2007 at 10:03:51PM +0200, Roberto Resoli wrote:
> > Are there any practical attempts to negotiate keys for SM by
> > use of public keys?
>
> As someone noted in another reply, there is another very
> interesting CWA: in 14890-1 (Chapter 8, "Device authentication"),
> different sc
Markus Schatzl ha scritto:
Hello,
I'd be interested if somebody here has practical experience with
"Secure Messaging" modes in general and would be so kind to
answer a few questions:
In authentic as well as in combined mode, the use of symmetric
ciphers seems to be the standard approach. T
Hello Markus,
Markus Schatzl schrieb:
> Hello,
>
> I'd be interested if somebody here has practical experience with
> "Secure Messaging" modes in general and would be so kind to
> answer a few questions:
Yes, we have. See [1] / IsoSecureChannel class for how that works.
>
> In authentic as we
Hello,
I'd be interested if somebody here has practical experience with
"Secure Messaging" modes in general and would be so kind to
answer a few questions:
In authentic as well as in combined mode, the use of symmetric
ciphers seems to be the standard approach. To migitate simple MITM
tec